Network Security for Automotive Embedded SystemsTonex
The document discusses cybersecurity challenges facing the automotive industry as vehicles become more connected and software-defined. As modern cars now resemble computers and receive over-the-air software updates, they are vulnerable to cyber attacks which could compromise safety systems or require large recalls. A 3-day training course is described that covers vulnerabilities in automotive embedded systems, network security best practices, and methods for securing interfaces and protocols to protect vehicles from cyber threats. The training is intended for professionals across automotive engineering, product development, and information security fields.
WHITE PAPER▶ Building Comprehensive Security Into CarsSymantec
Over the past few years, automotive security threats have gone from theory to reality. Tech-savvy thieves have stolen cars throughout Europe and North America. Online videos show hackers remotely hitting the brakes on cars in ways that can endanger drivers and passengers. Hackers can exploit some of these vulnerabilities from an adjacent lane without forewarning to the driver.
Other vulnerabilities are open to attack over the cellular network—from halfway around the world—and for large numbers of cars simultaneously.
Even though technology exists to solve many of these security problems, the challenges of deploying such technology in cars loom far larger than similar challenges do in traditional information technology (IT) systems. In traditional IT systems, most problems can be solved with a quick install, update, or configuration change—or at worst, restoring from a backup, executing a failover to a disaster recovery site, or calling in a breach response team to tackle the most sophisticated threats.
However, cars don’t work like that. Multi-year safety certification processes to meet Federal Motor Vehicle Safety Standards (FMVSS) requirements don’t engender the weekly, daily, and real-time security updates that IT teams enjoy. Nobody can call in a breach response team to investigate the millions of cars you’ve built, now happily garaged in millions of homes. A car can’t safely fail over to another car. Companies often use redundancies at critical IT layers to keep high-volume web services running reliably, but few, if any, carmakers can afford the NASA-like investment of doing this for every vehicle.
Protecting cars against such threats has to be done in a context that works both within the car, and at scale for carmakers. The responsibility doesn’t stop at the assembly line: It extends all the way from the carmakers to the full breadth, depth, and complexity of auto supplier relationships. Security is a concern at each tier of the value chain, and attackers seek the weakest links.
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)ParthaS
The document discusses connected cars and their role in the Internet of Things (IoT). Key points include:
- Connected cars rely on external connectivity for autonomous driving features but many drivers still prefer having control, so there will be a hybrid model with both driver control and autonomous features for some time.
- Connecting cars to the Internet introduces new security challenges and potential hacks as vehicles have wireless access points for connectivity. Proper security measures need to be implemented.
- As connectivity in cars increases, it enables new digital media and services for drivers and passengers but the wireless links need sufficient bandwidth to ensure a good consumer experience. Standards are being developed to handle high quality audio/video streaming in connected vehicles.
Megatrends 2013: Manage the AcceleratingAmount of Software in CarsRed Bend Software
Red Bend's Director of Market Adoption, Yoram Berholtz, speaking at the Megatrends 2013 event about ways and solutions for managing the increasing amount of software in the cars.
Webinar: IoT Industrial: Como criar soluções completas em minutosEmbarcados
O desenvolvimento de soluções de IOT Industriais é fundamental para o ganho de produtividade para empresas. Com o advento de novas tecnologias de plataformas IOT este desenvolvimento é muito mais simples, rápido e econômico. Neste webinar, a Telit, líder global em IOT Industrial demonstrará como soluções podem ser desenvolvidas em minutos, aumentando a produtividade das empresas e criando modelos de negócios disruptivos.
From Driver Distraction to Driver Augmentation: Open Source in CarsAlison Chaiken
This document discusses open source opportunities in the automotive industry as vehicles increasingly incorporate computer systems and connectivity. It notes security and privacy concerns with current "infotainment" systems and the lack of user control over vehicle data. The author advocates for driver empowerment through open platforms and protocols that allow independent developers to create helpful applications. Developers are encouraged to get involved by accessing vehicle data standards, supporting the right to repair movement, and joining related professional groups.
The document discusses modern cybersecurity architectures and Check Point's Infinity architecture. It outlines the challenges of fragmented security architectures like increased costs, vulnerabilities, and complexity. It then presents the Infinity architecture as a consolidated solution that provides comprehensive protection across networks, cloud, endpoints, and mobile devices through a unified management interface. Customers are cited that achieved cost reductions of 20-50% by consolidating their security with Infinity.
Cyber security for Autonomous Vehicles.pdfDorleControls
An overview of Cyber security for Autonomous Vehicles will be given in this introduction, along with a focus on the significance of protecting these cutting-edge modes of transportation.
As a tech partner for SafeRide Technologies, NIX helped to create a web application that provides security for internet-connected vehicles, predicts cyberattacks, and prevents hacking using real-time data. The application - vSentry - is a solution that offers a holistic approach for customers, including hardware, software, and training. Deep Learning algorithms set a normal behavior for a vehicle and sound the alarm and notifies of any anomalies which may signal cyber threats.
Achieving Software Safety, Security, and Reliability Part 2Perforce
In Part 2, we will focus on the automotive industry, as it leads the way in enforcing safety, security, and reliability standards as well as best practices for software development. We will then examine how other industries could adopt similar practices.
McKinsey | When Things Get Complex: Complex Systems, Challenges and Where to ...Intland Software GmbH
This talk was presented by Georg Doll (McKinsey Digital Munich) at Intland Connect: Annual User Conference 2020 on 22 Oct 2020. To learn more, visit: https://intland.com/intland-connect-annual-user-conference-2020/
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Mahbubul Alam
Cybersecurity is one of the biggest challenges for autonomous vehicles due to a large number of Internet-enabled software systems. The high dependence on Internet connectivity for navigation, telematics and information services makes autonomous vehicles highly vulnerable to network-based cyber attacks. For example, Denial of Service (DoS) attacks can block autonomous vehicles from receiving critical over-the-air (OTA) updates while connection hacking can be used to tamper software or re-task OTA instructions. Additionally, the automotive industry’s global supply chain is vulnerable to malware that propagates to critical vehicle systems from cloud environments. In response to the potential loss of life due to cyber attacks, the US government is introducing new legislation that mandates strict cybersecurity requirements for all networked software. This webinar will introduce participants to a new cybersecurity architecture called Software Defined Perimeter (SDP) that provides OEMs and application developers a framework to meet emerging government requirements to ensure safe autonomous vehicle operations. SDP utilizes a control channel to verify the identity and integrity of hardware and software systems before allowing automotive OTA transactions. Additionally, SDP’s application-aware connectivity ensures that malware cannot propagate through network connections.
Key Take-Aways:
Why are the existing cybersecurity solutions not suitable for the current auto industry?
How can SDP meet the new US government auto cybersecurity requirements?
Why the automotive industry should embrace SDP as a key technology for the next-generation cybersecurity solution?
Embedded Fest 2019. Віталій Нужний. The Mobility Revolution: the Software tha...EmbeddedFest
- The Future of Automotive: Autonomous, Connected, Electric, and Shared
- Unique Challenges on the Automotive Electronics Road
- Evolving from Hardware to Software: Changing to Stay Ahead of the Curve for Tier-1 Businesses
- Auto 2.0: What this Means for Suppliers
This presentation highlights various automotive security issues. What are the considerations specific to automotive security? What is the motivation for automotive attacks? Answers to these questions can be found in this presentation.
As the intricacy of Electronic Control Units (ECU) in present day vehicles has expanded, the requirement for automotive functional safety standard has turned out to be more goal. ISO 26262 standard tends to the all inclusive security hones required for planning basic car segments. We take a gander from an optimistic standpoint rehearses that will help you to plan ISO 26262-agreeable ECU programming.
Automotive Cyber Security Market_ Safeguarding the Future of Mobility.pdfMarket.us
The global Automotive Cyber Security market is anticipated to be USD 22.2 billion by 2032. It is estimated to record a steady CAGR of 22% in the review period 2023 to 2032. It is likely to total USD 3.9 billion in 2023.
Read More - https://market.us/report/automotive-cyber-security-market/
The document proposes a card-based scheme to ensure security and trust in vehicular communications. It discusses authentication requirements in vehicular networks and introduces a trusted security module. The proposed scheme uses a secret 16-digit code from a smart card to authenticate vehicles and enable them to securely communicate and obtain services. When verified by the vehicular service provider server, the code activates the vehicle's security module to generate certificates for messages and transactions. The scheme aims to solve authentication problems and ensure users are legitimate when joining the vehicular network.
Satellite communication provides a secure and reliable solution for connected vehicles. It offers several key benefits:
High security due to fewer entry points than terrestrial networks. Updates can be distributed securely via private satellite broadcast networks.
Global coverage allows vehicles to be updated anywhere instantly and reliably without terrestrial dependencies. The network can scale globally as needed.
Comprehensive security programs throughout development and operation, including reducing attack surfaces, authentication, monitoring for threats, and fast global remediation for any issues discovered help ensure safety.
How do you manage Internet of Things (IoT) devices at scaleDuncan Purves
How do you manage Internet of Things (IoT) devices at scale without scaling costs? Standards based Device Management. Presentation by Connect2 Systems at IoT Tech Expo in London on 23 January 2017.
Similar to FIDO Munich Seminar: Securing Smart Car.pptx (20)
Getting Ready for Copilot for Microsoft 365 with Governance Features in Share...Juan Carlos Gonzalez
Session delivered at the Microsoft 365 Chicago Community Days where I introduce how governance controls within SharePoint Premium are a key asset in a succesfull rollout of Copilot for Microsoft 365. The session was mostly a hands on session with multiple demos as you can see in the session recording available in YouTube: https://www.youtube.com/watch?v=MavcP6k5nU8&t=199s. For more information about Governance controls available in SharePoint Premium visit official documentation available at Microsoft Learn: https://learn.microsoft.com/en-us/sharepoint/advanced-management
Project Delivery Methodology on a page with activities, deliverablesCLIVE MINCHIN
I've not found a 1 pager like this anywhere so I created it based on my experiences. This 1 pager details a waterfall style project methodology with defined phases, activities, deliverables, assumptions. There's nothing in here that conflicts with commonsense.
Leading Bigcommerce Development Services for Online RetailersSynapseIndia
As a leading provider of Bigcommerce development services, we specialize in creating powerful, user-friendly e-commerce solutions. Our services help online retailers increase sales and improve customer satisfaction.
Lecture 8 of the IVE 2024 short course on the Pscyhology of XR.
This lecture introduced the basics of Electroencephalography (EEG).
It was taught by Ina and Matthias Schlesewsky on July 16th 2024 at the University of South Australia.
IT market in Israel, economic background, forecasts of 160 categories and the infrastructure and software products in those categories, professional services also. 710 vendors are ranked in 160 categories.
How CXAI Toolkit uses RAG for Intelligent Q&AZilliz
Manasi will be talking about RAG and how CXAI Toolkit uses RAG for Intelligent Q&A. She will go over what sets CXAI Toolkit's Intelligent Q&A apart from other Q&A systems, and how our trusted AI layer keeps customer data safe. She will also share some current challenges being faced by the team.
Ensuring Secure and Permission-Aware RAG DeploymentsZilliz
In this talk, we will explore the critical aspects of securing Retrieval-Augmented Generation (RAG) deployments. The focus will be on implementing robust secured data retrieval mechanisms and establishing permission-aware RAG frameworks. Attendees will learn how to ensure that access control is rigorously maintained within the model when ingesting documents, ensuring that only authorized personnel can retrieve data. We will also discuss strategies to mitigate risks of data leakage, unauthorized access, and insider threats in RAG deployments. By the end of this session, participants will have a clearer understanding of the best practices and tools necessary to secure their RAG deployments effectively.
Selling software today doesn’t look anything like it did a few years ago. Especially software that runs inside a customer environment. Dreamfactory has used Anchore and Ask Sage to achieve compliance in a record time. Reducing attack surface to keep vulnerability counts low, and configuring automation to meet those compliance requirements. After achieving compliance, they are keeping up to date with Anchore Enterprise in their CI/CD pipelines.
The CEO of Ask Sage, Nic Chaillan, the CEO of Dreamfactory Terence Bennet, and Anchore’s VP of Security Josh Bressers are going to discuss these hard problems.
In this webinar we will cover:
- The standards Dreamfactory decided to use for their compliance efforts
- How Dreamfactory used Ask Sage to collect and write up their evidence
- How Dreamfactory used Anchore Enterprise to help achieve their compliance needs
- How Dreamfactory is using automation to stay in compliance continuously
- How reducing attack surface can lower vulnerability findings
- How you can apply these principles in your own environment
When you do security right, they won’t know you’ve done anything at all!
Flame emission spectroscopy is an instrument used to determine concentration of metal ions in sample. Flame provide energy for excitation atoms introduced into flame. It involve components like sample delivery system, burner, sample, mirror, slits, monochromator, filter, detector (photomultiplier tube and photo tube detector). There are many interference involved during analysis of sample like spectral interference, ionisation interference, chemical interference ect. It can be used for both quantitative and qualitative study, determine lead in petrol, determine alkali and alkaline earth metal, determine fertilizer requirement for soil.
IVE 2024 Short Course Lecture 9 - Empathic Computing in VRMark Billinghurst
IVE 2024 Short Course Lecture 9 on Empathic Computing in VR.
This lecture was given by Kunal Gupta on July 17th 2024 at the University of South Australia.
Planetek Italia is an Italian Benefit Company established in 1994, which employs 120+ women and men, passionate and skilled in Geoinformatics, Space solutions, and Earth science.
We provide solutions to exploit the value of geospatial data through all phases of data life cycle. We operate in many application areas ranging from environmental and land monitoring to open-government and smart cities, and including defence and security, as well as Space exploration and EO satellite missions.
Multimodal Embeddings (continued) - South Bay Meetup SlidesZilliz
Frank Liu will walk through the history of embeddings and how we got to the cool embedding models used today. He'll end with a demo on how multimodal RAG is used.
2. WHO WE ARE?
IoT Security
Automotive CyberSecurity
IT Security Services
VinCSS FIDO2 Ecosystem
FIDO2 Ecosystem
Founded 2008
100+
High-profile, globally recognized
experts
2
3. SMART CAR ECOSYSTEM
A modern vehicle can contain up to 150 ECUs and
more than 100 million lines of software code.
which is projected to rise to 300 million lines of
code by 2030.
A modern vehicle contains more software than
Facebook without the backend code (62 million lines
of code). A vehicle also has more than double the
code of Microsoft Office 2013, over 6 times the code
of the Android OS, over 15 times the code of a Boeing
787
As more software is integrated into vehicles, the
risk of bugs and vulnerabilities increases, which
malicious attackers could exploit, potentially
leading to severe consequences for safety, privacy,
and vehicle operation.
3
4. 339% growth in automotive cyber
incidents since 2018
145% growth in critical vulnerabilities
of OEM, Tier 1 & 2 Suppliers between
2019-2022
97% of attacks in 2022 were remote
Automotive hacks pose
a great and immediate
threat to the OEM,
suppliers, and
ultimately – the driver.
RISING AUTOMOTIVE RISKS
4
5. 5
Automotive cybersecurity incidents have risen by
605% since 2016
As vehicles become increasingly connected and reliant on software, new vulnerabilities emerge, ranging from
unauthorized access to vehicle controls to personal data breaches.
• Help Net Security (2020) 'Automotive cybersecurity incidents doubled in 2019, up 605% since 2016', Help Net Security, 6 January. Available at:
https://www.helpnetsecurity.com/2020/01/06/auto- motive-cybersecurity-incidents/
• OODA Loop (2020) 'Automotive cybersecurity incidents doubled in 2019, up 605% since 2016', OODA Loop, 6 January. Available at:
https://www.oodaloop.com/briefs/2020/01/06/automotive-cyberse- curity-incidents-doubled-in-2019-up-605-since-2016/
• IBM (2023) New IBM Security X-Force Threat Intelligence Index is here: Gain insights into the cyberthreat landscape. Available at:
https://community.ibm.com/community/user/security/blogs/john-zorabedian1/2023/02/16/new-ibm-security-x-force-threat-intelligence-index
Over 470 million connected vehicles
are expected by 2025, significantly raising
cybersecurity
risks in the automotive industry
The transportation industry was the ninth most
targeted sector in 2022, accounting for 3.9%
of attacks among the top ten industries
By 2024, the automotive industry could face losses
of up to US$505 billion due to
cyberattacks
6. Since 2021, VinCSS has evolved to
become a frontrunner in automotive
cybersecurity, provide dedicated
services for this rapidly growing
industry
Our services are tailored to the
automotive development lifecycle,
ensuring comprehensive coverage
from design to implementation, and
ongoing monitoring
Our commitment to excellence is
evidenced by our achievement of the
UN R155 and R156 certifications
across multiple vehicle models and
markets
AUTOMOTIVE CYBERSECURITY SERVICES
V-Model development process used
in the automotive industry
6
7. VINCSS IS AT THE FOREFRONT OF
DEPLOYING FDO GLOBALLY
FDO FOR CAMERAS
(12/2022)
FDO+MESH FOR
CAR PARK SENSORS (9/2023)
7
FDO FOR NETWORKING DEVICES
(5/2024)
8. FDO IN
AUTOMOTIVE
• After three years of parallel R&D in the FDO sector
and providing services in the automotive
cybersecurity sector, we have realized that FDO
technology (including FIDO2) can be applied to
smart vehicle ecosystems and help massively
address the challenges and risks.
• Below is our perspective on a few use cases where
FDO can be applied in the automotive cybersecurity
field
8
9. 9
USE CASE 01:
FDO FOR KEY MANAGEMENT IN OEM
● ECUs are the heart of a smart car, and the security
key is the method for controlling access/interference
with the ECU. However, the way OEMs currently
manage the keys throughout the vehicle's lifecycle is
inadequate, leading to many vulnerabilities and
significant risks.
● OEMs often use manual methods to manage keys
during the R&D phase, but as soon as they move into
production and aftersales, a Key Management
System (KMS) is needed due to the exponential
increase in the number of keys, which surpasses the
capabilities of manual methods.
● However, even when using a KMS, the current key
management at OEMs still does not meet practical
needs.
THE PROBLEM
10. 10
USE CASE 01:
THE KMS
Tier 1 Factory A
K1
K1 K2
K2
K1
1
2 6
7
3
4
4
VIN xyz
K VIN xyz
K VIN xyz
KMS Central
OEM
OEM
[K VIN xyz
]K1
[K VIN xyz
]K2
3
8
5
KMS Factory
ECU 1
K1
ECU 2
K2
Tier 1 Factory A
ECU 1
K1
K2
ECU 2
K2
VIN xyz
K VIN xyz
ECUs sent to OEM factory for
installation in vehicles
ECU keys and IDs sent to Tier
1 and loaded in ECUs
ECU keys and IDs
generated by
OEM KMS Central
8
5
7
ECU keys and IDs sent
to OEM KMS Factory
Vehicle’s key generated
by OEM KMS Factory
Vehicle’s key + VIN + ECU
ID sent to OEM KMS
Central
Vin and ECU IDs sent to
OEM KMS Factory
Vehicle’s key sent
• Encrypted w/ ECU 1’s key
• Encrypted w/ ECU 2’s key
11. 11
USE CASE 01:
REMAINS ISSUES
● Keys are provisioned to the ECU in an insecure manner, facing many risks of being exposed:
OEMs transfer keys by directly sending them to contractors without any encryption mechanism.
● Keys stored in the ECU usually lack an update mechanism when exposed. Once exposed, OEMs
often have to replace the part with new keys, which is very costly.
● Vehicles within the same model line often share a common set of keys. Generating keys for each
vehicle, if not well managed, can cause issues during after sales service (part
replacement/upgrade). Many OEMs use the same key set for development and production.
● Developers/technicians often require access to keys to diagnose ECU errors when there are
integration issues with the vehicle. Risk from 3rd party leaks!
12. 12
USE CASE 01:
WORK AROUND
• Establish KMS services to securely store and safely provide keys to contractors.
• Use SHE (Secure Hardware Extension) to encrypt keys before performing updates via UDS
(Unified Diagnostic Service).
• Upgrade in-vehicle networks to use CAN FD or Ethernet (instead of CAN BUS) to employ
encrypted communication methods, preventing eavesdropping by malicious ECUs (ECUs
maliciously embedded in the vehicle to eavesdrop on CAN messages during key updates at
service workshops).
However, synchronously applying all these solutions is currently quite costly, complex, and unfeasible
due to the varying development capabilities of contractors. If applied separately, these measures will
not ensure the elimination of key exposure risks.
13. 13
USE CASE 01:
FDO FOR KEY MANAGEMENT IN OEM
FDO FOR KMS
• VinCSS proposes using the FDO protocol with some
modifications to suit the operation within the vehicle
network. This solution also does not require upgrading
the vehicle network as the data is encrypted.
• FIDO Device Onboarding (FDO) is a protocol developed
by the FIDO Alliance that simplifies and secures the
onboarding process of IoT devices, providing a secure
method for transferring information during the initial
operation of IoT devices.
• If we consider ECUs, EoL Tools, and Diagnostic Tools as
edge devices, it is entirely possible to apply the FDO
protocol to onboard these devices with the necessary
keys when they are assembled in a complete vehicle
or when it is necessary to change/replace the keys in
the vehicle securely.
15. 15
ECUx ECUx
No credentials
found
Assemble into vehicle and power up
Check credentials
Request Connect
Request Connect
Response
Response
Setup secure communication
Response
Exchange security keys
Response
Verity the client
USE CASE 01:
KEY MANAGEMENT IN OEM
16. 16
TRUST RELATIONSHIP OF A CHARGING STATION
AND TRUST CERTIFICATES MANAGEMENT
Charging
Station
Authorized Field
Technician
Remote attackers Counterfeited
Charging Station
Malware Remote attackers
Local attackers
Firmware
Developer
EV
Interoperable (PKI)
DISTRUST
DISTRUST
CPO Backend
PKI
17. 17
USE CASE 02:
FDO FOR SUPPLY CHAIN
● Complexity and Interconnectedness: The automotive
supply chain involves multiple stakeholders and
interconnected systems, creating numerous entry
points for cyber attackers.
● Legacy Systems and Software: Many automotive
systems are built on legacy technologies not designed
with cybersecurity in mind, making it challenging to
retrofit security measures.
● Lack of Standardization: The absence of industry-wide
standards complicates cybersecurity practices and
increases integration risks.
KEY CHALLENGES
18. 18
USE CASE 02:
FDO FOR AUTOMOTIVE SUPPLY CHAIN
• Multi-Layered Security Approach
• Building a Culture of Cybersecurity
• Collaboration and Information Sharing:
• Compliance and Regulatory
Frameworks: Adhere to frameworks like ISO/SAE
21434, UN Regulation No. 155, AUTOSAR, and ISO
26262 to build a strong cybersecurity foundation.
• Embracing Emerging Technologies: Use
machine learning, AI-powered solutions, and
FIDO/FDO to solve cybersecurity challenges.
BEST PRACTICES
19. 19
USE CASE 02:
FDO FOR AUTOMOTIVE SUPPLY CHAIN
• FDO establishes a protected environment called ROE
(Restricted Operating Environment).
• The ROE is created on SoCs (System on Chip - e.g., from
Texas Instruments, STM) that support SecureBoot,
eFuse, and Flash Encryption or hardware devices
equipped with TPM (Trusted Platform Module).
• The purpose of ROE is to ensure the integrity of the
firmware (which contains FDO) as well as all the data
that the firmware processes. Additionally, this data is
strongly encrypted to prevent decryption and reverse
engineering of the firmware or installation of unofficial
firmware.
FIRMWARE SECURITY
20. Secure Firmware Automation Tool
20
Factory
Firmware
OTA
Remote management Push OTA
notification
VinCSS IoT
Platform
Application
VinCSS FDO
Release a firmware
for a device
Car
Infotainment
Update firmware
Signed
Firmware
Signed
Bootloader
Bootloader
Public Key
Hash
Bootloader
Private Key
FDO
Manufacture
Private Key
VinCSS
Supply
Chain Tools
New
device
VinCSS
KeyStore
Sign the firmware with
the specific keys
Firmware
find appropriate keys
for device
false
Create new keys
Key block
sign firmware
burn
firmware
Data block
Store and perform
firmware versioning
23. NEXT STAGES
1. Have a working FDO automotive use case in practice
for a vehicle model where we can access the
components as a Tier 1 level contractor and coordinate
completely with the OEM. VinCSS will coordinate as an
FDO vendor.
2. Work with a KMS vendor to add FDO support to their
product.
3. Learn from vendor-dependence lesson and find a
workaround solution for automotive like we did with
FDO for WIFI router.
4. Continue R&D for more FDO applications in the
automotive and IoT security domains.
23
24. VINCSS INTERNET SECURITY
SERVICES JSC
• 20Ath Floor, Vincom Center Dong Khoi 45A Ly
Tu Trong Street, Ben Nghe Ward, Dist. 1, HCMC,
Vietnam.
• Email: v.office@vincss.net
• Website: www.vincss.net
THANK YOU!
24